1.888.749.9800

Blog

Data Protection and GDPR

Do you know how your data is being used?

The most important thing an individual can do to understand how their data is used is to limit the information they provide. People by nature desire to be helpful. They click and respond quickly without a thought. Stop and think before you click.

If all of the information […]

By |June 19th, 2018|Blog|Comments Off on Data Protection and GDPR
  • Permalink Gallery

    What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

Choosing the right cyber security consultants for an SMB can feel intimidating, but it doesn’t have to be. You don’t have to know much about cyber security to ask the right hiring questions.

To make an informed decision, an SMB should ask about the consultant’s qualifications, track record, quality of work, breadth of technical services, payment model, and […]

By |May 23rd, 2018|Blog|Comments Off on What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

Top Tips for World Password Day – May 4th

To commemorate World Password Day today, I thought I’d share my top tips for for creating passwords.  They are very basic, but if you follow these guidelines, you will have a added layer of protection for your digital information.

1. A password should not be a dictionary word.

2. A password should not be easily guessable (i.e. “go pats”).

3. A password should not be […]

By |May 4th, 2018|Blog|Comments Off on Top Tips for World Password Day – May 4th

Managing IT Risk (Part 2)

Third Party Risk Management

Following up on my prior post Third Party Risk Management, (4/9/18), I’d like to share my recommendations to monitor and manage IT risk.

There are a number of Governance, Risk, and Compliance (GRC) tools available, ranging from the inexpensive to the extremely expensive. Small to medium size companies are generally […]

By |April 17th, 2018|Blog|Comments Off on Managing IT Risk (Part 2)

Managing IT Risk (Part 1)

Third Party Risk Management

Topping my list of information security risks for the coming year is third party risk management. Small to medium size companies do not have the workforce necessary to monitor the security posture of their technology service providers. To properly address the issue, a company will need to put the following in place and dedicate resources […]

By |April 9th, 2018|Blog|Comments Off on Managing IT Risk (Part 1)

Best Practices for Contracting with Cloud Service Vendors

I was recently asked about best practices for contracting with cloud service vendors – and thought this advice was worth sharing.

What is the best strategy if you decide to change vendors?

Always conduct a parallel transition. This will keep your data in place at your original vendor during the transition. This cost more but will protect […]

By |March 16th, 2018|Blog|Comments Off on Best Practices for Contracting with Cloud Service Vendors
  • Permalink Gallery

    The Shift that EternalBlue May Have Caused Within IT Leadership

The Shift that EternalBlue May Have Caused Within IT Leadership

For leaders in IT, 2017 has been the year of EternalBlue (the weaponized version of the vulnerability described in MS17-010), whether they know it or not.  EternalBlue allowed the trivial exploitation of Microsoft systems allowing an attacker to gain the highest level of system permissions.  This sort of vulnerability set the hacking community on fire and allowed […]

By |February 26th, 2018|Blog|Comments Off on The Shift that EternalBlue May Have Caused Within IT Leadership

How to Prevent a Ransomware Attack

It is always better to be proactively prepared and prevent ransomware attacks than having to react after an attack occurs. Paying the ransom is not recommended.

Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. The “No More Ransom” website is an initiative by […]

By |February 16th, 2018|Blog, Security Breach|Comments Off on How to Prevent a Ransomware Attack

Intel’s Meltdown and Spectre Vulnerabilities

By now you have probably read some articles about the Meltdown and Spectre vulnerabilities but you may still be seeking guidance for how your organization should react.

First a quick recap, Meltdown and Spectre were announced early in January of 2018. Unlike most other vulnerabilities, Meltdown and Spectre exploit critical vulnerabilities in modern processors. Meltdown primarily […]

By |January 29th, 2018|Blog|Comments Off on Intel’s Meltdown and Spectre Vulnerabilities
  • Permalink Gallery

    Why Phishing and Social Engineering Continue to be so Popular

Why Phishing and Social Engineering Continue to be so Popular

Phishing and social engineering continue precisely because they are so effective!

Sophisticated User: If you are the vice president of customer service and you receive an email purportedly from the Better Business Bureau that contains a link to Complaint #67587 about one of your products, how do you not click through on that embedded link?

By |January 4th, 2018|Blog, Security Breach|Comments Off on Why Phishing and Social Engineering Continue to be so Popular

Cyber Security Trends and Predictions for 2018

I was recently asked my thoughts about cyber security trends for the coming year. Here are a few of my predictions:

  • GDPR requirements will expose data handling issues that greatly exceed expert predictions. Tools will be developed to automate the encapsulation of discovered data into secure cloud based environments.  This will address security and data […]
By |December 11th, 2017|Blog|Comments Off on Cyber Security Trends and Predictions for 2018
  • Permalink Gallery

    Increasing Threat of Cyber Attacks: How Cyber Security has Shifted

Increasing Threat of Cyber Attacks: How Cyber Security has Shifted

Following are answers from a recent interview looking at the threat of cyberattacks and how cyber security has increased in recent years.

Q. What’s driving the shift in cyber security?

A. As the world becomes more digitally connected with a wide variety of available technologies and options, the need to secure the data has increased dramatically. The […]

By |November 27th, 2017|Blog, Security Breach|Comments Off on Increasing Threat of Cyber Attacks: How Cyber Security has Shifted
  • Permalink Gallery

    What are the five most critical steps to take during the first 48 hours post data breach?

What are the five most critical steps to take during the first 48 hours post data breach?

1. Protect – The first and most important (time sensitive) step is to protect your environment and prevent additional damage and/or data loss.  This could be as simple as disconnecting from any wired and wireless networks.  Also disconnect any local backup drives that could overwrite previously archived data.

2. Communicate – It is vital to […]

By |November 16th, 2017|Blog, Security Breach|Comments Off on What are the five most critical steps to take during the first 48 hours post data breach?

Can Additional Legislation Improve IoT Security

I was recently asked if increased legislation could help improve IoT security, and how it will affect the IT department. Here’s my response:

Legislation can absolutely help IoT security by ensuring that manufacturers follow common core principles, strategies and infrastructure. The Cybersecurity Improvement Act of 2017 is an example of how legislation can compel manufacturers to […]

By |October 23rd, 2017|Blog, IoT|Comments Off on Can Additional Legislation Improve IoT Security

Qualifying IT Security Risks

How should a small organization quantify risk when it comes to IT security?  

In my last post, I discussed how people with little or no IT security experience are often put in charge of IT security at small companies. I explained how they might approach telling their boss how things are going on the security […]

By |October 5th, 2017|Blog|Comments Off on Qualifying IT Security Risks